east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is decrypted automatically during the transfer from disk to memory, and re-encrypted when data is written back to disk. This process is transparent to the user. Safes can be created on your local or external hard-disks, on USB sticks or other removable devices, on CD/DVD, and over the network, in full-rights mode, or read-only mode. You can save the passwords on removable disk devices, such as USB stick, memory cards, and use them as key to open your safes. east-tec SafeBit allows you to change the name, description, drive letter, password, size and you can also set to open safes automatically on Windows start-up. The software maintains the security of data even in case of incorrect system shutdown or system crash by keeping the files always encrypted. Container files are protected against accidental deletion. Security is increased also by the 'automatic closure system' and emergency hotkeys. To improve the security of your data you can use the Virtual Keyboard while entering the passwords, this will prevent any key logger software from stealing them. east-tec Safebit is the perfect supplement to a firewall and antivirus program, and stands as the last line of defense in case these fail. Nothing can crack the strong 256-bit AES encryption the program uses (selected by the U.S. government as its official encryption standard). It has a very intuitive user interface which makes it friendly for computer beginners and also powerful for experienced IT experts that search for a reliable file encryption solution. It will protect your confidential information against possible thefts, or from your boss, wife, kids, competitors, hackers, viruses or trojans even if your firewall fails. ...
The enterprise cryptographic filesystem for Linux......
A fork of the now-discontinued TrueCrypt . CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.After creating an encrypted......
Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information. EW encrypts all file types for data-in-transit protection and supplements data-at-rest protection. Without requiring installation or elevated privileges, EW runs on Windows, Mac, Linux, Solaris, and any other computers with Standard Edition Java.......
AES Crypt is an advanced file encryption utility that integrates with the Windows shell or runs from the Linux command prompt to provide a simple, yet powerful, tool for encrypting files using the Advanced Encryption Standard (AES). A Java library is also available for developers using Java to read and......
CryFS encrypts your files, so you can safely store them anywhere. It works well together with cloud services like Dropbox, iCloud, OneDrive and others. The goal of CryFS is not only to keep file contents, but also file sizes, metadata and directory structure confidential.......
AreaGuardNeo is file encryption and USB protection tool integrated with Microsoft Active Directory.......
Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......
iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......
This powerful tool suite will allow you to change your System default privacy settings, and allows you to easily and quickly hide your IP via the integrated proxy manager. Privacy Optimizer also includes a free privacy optimized web browser that more readily fulfills the need to be anonymous in both......
Boxcryptor is an easy-to-use encryption software optimized for the cloud. It allows the secure use of cloud storage services without sacrificing comfort. Boxcryptor supports all major cloud storage providers (such as Dropbox, Google Drive, Microsoft OneDrive, SugarSync) and supports all the clouds that use the WebDAV standard (such as Cubby,......
LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user......
To protect your data Saferoom uses the AES-256 encryption algorithm with a key length of 256-bit. Currently, it is the most secure algorithm in the world which is used for military-grade confidential documents.Saferoom is a completely client-based application. This means that Saferoom operates only inside the device where it has......
FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.......
Lock and encrypt your photos, movies, files and folders using 256-bit file encryption.The trial version of Kruptos 2 Professional is fully complete with no functional limitations for 30 uses. After the trial period expires you will still be able to use Kruptos 2 fully, the only limitation being the performance......
Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc